Support X-Forwarded-* header in OriginalUrlExtractor
See original GitHub issueDescription
I added the following ACL file to my deployment to avoid that people put stuff in my server:
# Root ACL resource for the agent account
@prefix acl: <http://www.w3.org/ns/auth/acl#>.
@prefix foaf: <http://xmlns.com/foaf/0.1/>.
# The homepage is readable by the public
<#public>
a acl:Authorization;
acl:agentClass foaf:Agent;
acl:accessTo <./>;
acl:mode acl:Read.
# The owner has full access to every resource in their pod.
# Other agents have no access rights,
# unless specifically authorized in other .acl resources.
<#owner>
a acl:Authorization;
acl:agent <http://dylanvanassche.inrupt.net>;
# Optional owner email, to be used for account recovery:
acl:agent <mailto:me@dylanvanassche.be>;
# Set the access to the root storage folder itself
acl:accessTo <./>;
# All resources will inherit this authorization, by default
acl:default <./>;
# The owner has all of the access modes allowed
acl:mode
acl:Read, acl:Write, acl:Control.
When I try to use Penny to view my data as a logged-in user, I get:
And the following in my server logs:
2021-03-02T14:27:29.395Z [DPoPWebIdExtractor] warn: Error verifying WebID via DPoP-bound access token: Incorrect issuer https://inrupt.net/ for WebID https://dylanvanassche.inrupt.net/profile/card#me
Steps to reproduce
- Setup the SOLID Community Server
- Push the ACL file with a HTTP PUT command
- Open Penny, authenticate with your external SOLID WebID
- Try to view your data by entering the server URL in the URL bar of Penny.
Environment
- Community Server main branch 02/03/2021 (
e3cf2f9469fdeb7abf2916209be3443e8bee3d87
) at https://data.dylanvanassche.be - Inrupt WebID provider: https://dylanvanassche.inrupt.net
- Armbian 21.02.2 Focal
- Odroid HC2 (armv7)
- Penny (https://penny.vincenttunru.com)
Issue Analytics
- State:
- Created 3 years ago
- Comments:13 (13 by maintainers)
Top Results From Across the Web
K4816: Using the X-Forwarded-For HTTP header to preserve ...
K4816: Using the X-Forwarded-For HTTP header to preserve the original client IP address for traffic translated by a SNAT object ...
Read more >Spring Boot behind a load balancer using the X-Forwarded ...
In this article you'll discover how to make use of the X-Forwarded headers passed from a load balancer to your Spring Boot application,...
Read more >X-Forwarded-For - HTTP - MDN Web Docs
The X-Forwarded-For (XFF) request header is a de-facto standard header for identifying the originating IP address of a client connecting to ...
Read more >does otlpreceiver support http header X-Forwarded-For ? #4901
I send traces data from web to otlpreceiver http port 55681, the http request header has X-Forwarded-For attribute. but the receiver not ...
Read more >HTTP header manipulation - Envoy Proxy
The x-forwarded-host header is a de-facto standard proxy header which indicates the original host requested by the client in the :authority ( host...
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
@DylanVanAssche Thanks, turned this into a feature request.
I was just about the post that workaround 😃 I literally found it a couple of minutes ago
This configuration works with Penny as external data browser 🎉
FYI: Without
-b https://data.dylanvanassche.be
I get: